Data Transmission – Practice Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/53

flashcard set

Earn XP

Description and Tags

A comprehensive set of 55 question-and-answer flashcards covering all major concepts from Chapter 2: Data Transmission, including packet structure, transmission methods, error detection, and encryption.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

54 Terms

1
New cards

What is a datagram (data packet)?

A small unit of data used for transmission over a network, typically 64 KiB in size.

2
New cards

Why are data packets usually limited to roughly 64 KiB?

Smaller packets are easier to control and can be routed independently, allowing alternative paths if a route is busy or fails.

3
New cards

What is the main drawback of splitting data into packets?

The packets must be reassembled in the correct order at the destination.

4
New cards

Name the three main parts of a data packet.

Header, payload, and trailer.

5
New cards

List four items found in a packet header.

Sender’s IP address, receiver’s IP address, sequence number, packet size (and often total-packets indicator).

6
New cards

What does the payload of a packet contain?

The actual user data being transmitted (about 64 KiB per packet).

7
New cards

Give two functions of the packet trailer.

Marks the end of the packet and carries error-checking information.

8
New cards

Which error-checking method is commonly stored in the trailer of a packet?

Cyclic Redundancy Check (CRC).

9
New cards

Briefly describe how a CRC works.

Sender counts all 1-bits in the payload, stores the hex value in the trailer; receiver recalculates and compares—if values differ, the packet is resent.

10
New cards

Define packet switching.

A transmission method where a message is broken into packets that are routed independently through a series of routers to the destination.

11
New cards

How does a router choose a path for each packet?

It selects the shortest available route that is not congested or faulty, based on the destination IP address.

12
New cards

State two benefits of packet switching.

Lines are not tied up by one message, and packets can be rerouted around busy or failed links (also scalable and supports high data rates).

13
New cards

State two drawbacks of packet switching.

Packets can be lost or arrive out of order, causing reordering delays and problems with real-time streaming.

14
New cards

Define data transmission.

The process of sending data from a source to a destination via a communication medium (wired or wireless).

15
New cards

What are the three key factors considered in any transmission?

Direction of data flow, transmission method (bits at once), and synchronisation of data.

16
New cards

What is a protocol in networking?

A set of rules governing how data is transmitted so devices can communicate reliably and securely.

17
New cards

Name the three modes of data transmission direction.

Simplex, half-duplex, and full-duplex.

18
New cards

Describe simplex transmission.

Data flows in one direction only, e.g., computer to printer.

19
New cards

Describe half-duplex transmission.

Data flows both directions but not simultaneously, e.g., walkie-talkies.

20
New cards

Describe full-duplex transmission.

Data flows in both directions at the same time, e.g., broadband internet.

21
New cards

What is serial data transmission?

Sending one bit at a time down a single channel or wire.

22
New cards

Give one advantage and one disadvantage of serial transmission.

Advantage: Reliable over long distances with synchronised arrival. Disadvantage: Slower than parallel transmission.

23
New cards

What is parallel data transmission?

Sending several bits (often a byte) simultaneously across multiple channels/wires.

24
New cards

Why is parallel transmission unsuitable for long distances?

Different wires experience different delays, causing skew so bits arrive unsynchronised.

25
New cards

Name two contexts where parallel transmission is still used.

Inside computer circuits and short cable connections where high speed is essential.

26
New cards

What does USB stand for and what type of transmission does it use?

Universal Serial Bus; it uses serial data transmission.

27
New cards

Which two duplex modes are permitted by USB?

Half-duplex and full-duplex.

28
New cards

How many wires are in a standard USB cable and what are they for?

Four wires: two for power (red & black) and two for data (white & green).

29
New cards

List two advantages of USB-C over older USB connectors.

Reversible 24-pin design, supports up to 100 W power and 10 Gbps data (enabling 4K video).

30
New cards

Define an error in data transmission.

A situation where received data differs from the data that was sent.

31
New cards

Give three common causes of transmission errors.

Electrical interference, weak signals/noise, hardware faults or packet-switching problems (loss/skew).

32
New cards

Why must transmitted data be checked for errors?

Corrupted data can damage files, give wrong instructions, or cause data loss; computers need accurate data to function correctly.

33
New cards

Name the four main error-detection methods covered.

Parity checks, checksums, echo check, and automatic repeat requests (ARQ).

34
New cards

Explain an even parity check.

A parity bit is set so the total number of 1-bits (including the parity bit) is even; receiver recounts to detect odd-bit errors.

35
New cards

What limitation do parity checks have?

They detect only an odd number of bit errors; two flipped bits could go unnoticed.

36
New cards

Describe the checksum process in four steps.

Sender computes value with agreed algorithm, sends it with data; receiver recalculates checksum; if values match, data accepted; otherwise, data is resent.

37
New cards

Give one real-world use of checksums.

Verifying file integrity on downloads (e.g., MD5, SHA-256) or in TCP/IP packet headers.

38
New cards

How does an echo check work?

Receiver sends the received data back to sender; sender compares the echo with the original to detect discrepancies.

39
New cards

Why is echo checking considered unreliable?

If a difference exists, it is unclear whether the error occurred on the outbound or return path.

40
New cards

What is a check digit and where is it used?

A final digit calculated from the other digits in a code to detect entry errors; used in ISBNs, barcodes, credit-card numbers, etc.

41
New cards

List two common errors a check digit can detect.

Incorrect single digit entry and transposition of two digits (it can also detect missing or extra digits).

42
New cards

Briefly outline how the ISBN-13 check digit is generated.

Sum odd-position digits, sum even-position digits ×3, add both, find remainder ÷10; if remainder ≠0, subtract from 10 to get the check digit.

43
New cards

What does ARQ stand for and what does it do?

Automatic Repeat Request; it uses acknowledgements and time-outs to ensure corrupted data is retransmitted until received correctly.

44
New cards

Differentiate positive and negative acknowledgements in ARQ.

Positive ACK confirms correct receipt; negative ACK indicates error and requests retransmission.

45
New cards

Define encryption in the context of data transmission.

Transforming plaintext into ciphertext using a key so that only authorised users can read it.

46
New cards

Why is encryption essential for data sent over public networks?

It prevents intercepted data from being understood or modified by unauthorised parties (eavesdroppers).

47
New cards

Differentiate plaintext and ciphertext.

Plaintext is the original readable data; ciphertext is the scrambled, unreadable data after encryption.

48
New cards

What is symmetric encryption?

An encryption method where the same secret key is used to encrypt and decrypt data.

49
New cards

Give one advantage and one disadvantage of symmetric encryption.

Advantage: Fast, suitable for large data. Disadvantage: Key distribution problem—if the key is intercepted, security is broken.

50
New cards

What is asymmetric encryption?

Encryption that uses a public key for encryption and a private key for decryption, eliminating the need to share a secret key.

51
New cards

How does asymmetric encryption solve the key-distribution problem?

Only the public key is shared openly; the private key remains secret, so no confidential key needs to be transmitted.

52
New cards

Who can access the public and private keys in asymmetric encryption?

Everyone can access the public key, but only the key owner knows the private key.

53
New cards

Give one typical use for asymmetric encryption.

Secure web communications (SSL/TLS), digital signatures, or secure email.

54
New cards

Summarise the main difference between symmetric and asymmetric encryption.

Symmetric uses one shared key for both operations, while asymmetric uses separate public/private keys, enhancing key-exchange security.